MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
System and Network Security Practices COEN 351 E-Commerce Security.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lecture 11 Reliability and Security in IT infrastructure.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
Securing Information Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
1 IS 8950 Managing Network Infrastructure and Operations.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Assuring Reliable and Secure IT Services Chapter 6.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Honeypot and Intrusion Detection System
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Completing network setup. INTRODUCTION Course Overview Course Objectives.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
A Critical Analysis on the Security of IoTs
Computer Security By Duncan Hall.
Assuring Reliable and Secure IT Services Chapter 6.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security Sample security policy Dr Alexei Vernitski.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
UNIT V Security Management of Information Technology.
Securing Information Systems
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Securing Information Systems
Columbus State University
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007, All Rights Reserved.

Personal Security -Guard against Phishing scams -Guard against keyboard logging software on public machines -Guard against sending and password addresses on open wireless networks. -Zombies are machines that have already been compromised -Run a firewall on your home computer Firewalls: -Use spyware protection software like spybot. -If possible use an operating system like Linux, that, when setup, is impervious to viruses.

Ethics from a Business Perspective Proportionality: Good should outweigh bad, and least bad should be used to accomplish the good. Informed Consent: Always get users/employees to be informed and to accept the risks Justice: Those who profit the most should bear the most risk Minimize risk: Similar to proportionality. -These are useful as a check list to ensure any new technology used by employees or customers or suppliers is ethical and defensible. -These can also be used to justify a policy of snooping on employees that is ethical and defensible. How can it be used to do that?

Security from a Business Perspective Threat: Changing employees, and securing data What kind of data? Customer lists, company statistics, internal memos -make employees sign really strong NDAs TCP/IP: Inherently hardened against network failure What is most important to a company? h/w, s/w, or data? Sources of problems with company data: -Failure of components (disk drives, optical disks) -Bugs in application software -Bugs in OS software -Attacks by malicious parties Adding redundancy increases complexity. E.g., Mirroring of data, mirroring of websites.

Checklist of Components of high availability: Uninterruptible Electric Supply Dual power inputs, UPS, access 2 power grids, diesel generators, battery less flywheel technologies on UPS (crank wheels) Physical Security Guards, CC TV, buffer zones, buildings hardened, single person (hostage proof buffers) biometric access, motion sensors Movie: Sneakers, 1992 Fire suppression, gas sealing

Availability Checklist Components of high availability (contd.): Network Access Two backbone providers, redundant connections, redundant network centers, private networks instead of the public internet Help Desk Manned 24X7, Automated backup procedures, disaster recovery plans. Why can’t we make servers redundant? What about the application servers? Log files need to be transferred. What about the database server? The database files need to be replicated.

Classification of Threats External Attacks: -Denial of Service (DOS): Distributed DOS, degradation of service Intrusions: -Social Engineering (Sneakers movie) -sniffing network traffic that is unencrypted -password cracking software -operating system hacks Viruses & worms -Because of operating system problems

Managing Security Security Policies: password content, frequency of change, access to databases, access to applications, what can users download?, central identity servers? password or token? Encryption: network data should be encrypted. Use https for all application access. Files can be encrypted on disk as well. Public Key versus Private key encryption Keeping track of patches and changes in the versions of code are part of security policies. Intrusion Detection: The Cuckoo’s Egg (recommended reading) by Clifford Stoll